The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?

This research looks at the kinds of IoT projects being driven by global organizations, their key challenges and perceived threats, along with hard data outlining the frequency and type of attacks they’ve already experienced.

We looked into MQTT brokers and CoAP servers around the world to assess IoT protocol security. Learn how to prevent risks and secure machine-to-machine (M2M) communications over MQTT and CoAP in our research.

Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?

A critical factor contributing to the increasing expenses on mobile phones is fraud. Recently, the cost of criminal telecom equipment has decreased to the point that individuals can launch attacks. Read our report produced in collaboration with Europol.

A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.

A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.